Configuring Server Load Balancing

Size: px
Start display at page:

Download "Configuring Server Load Balancing"

Transcription

1 Configuring Server Load Balancing This chapter describes how to configure the IOS Server Load Balancing (SLB) feature. For a complete description of the SLB commands in this chapter, refer to the Server Load Balancing s chapter of the Cisco IOS IP Reference, Volume 1 of 3: Addressing and Services. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online. To identify the hardware platform or software image information associated with a feature, use the Feature Navigator on Cisco.com to search for information about the feature or refer to the software release notes for a specific release. For more information, see the Identifying Supported Platforms section in the Using Cisco IOS Software chapter in this book. The SLB feature is a Cisco IOS-based solution that provides IP server load balancing. Using the IOS SLB feature, the network administrator defines a virtual server that represents a group of real servers in a cluster of network servers known as a server farm. In this environment the clients are configured to connect to the IP address of the virtual server. The virtual server IP address is configured as a loopback address, or secondary IP address, on each of the real servers. When a client initiates a connection to the virtual server, the IOS SLB function chooses a real server for the connection based on a configured load-balancing algorithm. IOS SLB shares the same software code base as Cisco IOS software and has all the software features sets of Cisco IOS software. IOS SLB is recommended for customers desiring complete integration of SLB technology into traditional Cisco switches and routers. On the Catalyst 6500 switch, IOS SLB takes advantage of hardware acceleration to forward data packets at very high speed when running in dispatched mode. IOS SLB assures continuous, high availability of content and applications with proven techniques for actively managing servers and connections in a distributed environment. By distributing user requests across a cluster of servers, IOS SLB optimizes responsiveness and system capacity, and dramatically reduces the cost of providing Internet, database, and application services for large-scale sites as well as small- and medium-sized sites. IOS SLB facilitates scalability, availability, and ease of maintenance as follows: The addition of new physical (real) servers, and the removal or failure of existing servers, can occur at any time, transparently, without affecting the availability of the virtual server. The slow start capability of IOS SLB allows a new server to increase its load gradually, preventing failures caused by assigning the server too many new connections too quickly. IOS SLB supports fragmented packets and packets with IP options, buffering your servers from client or network vagaries that are beyond your control. Administration of server applications is easier. Clients know only about virtual servers; no administration is required for real server changes. IPC-133

2 IOS SLB Functions and Capabilities Configuring Server Load Balancing Security of the real server is provided because its address is never announced to the external network. Users are familiar only with the virtual IP address. You can filter unwanted flows based on both IP address and TCP or UDP port numbers. Though it does not eliminate the need for a firewall, IOS SLB also can help protect against some denial-of-service attacks. In a branch office, IOS SLB allows balancing of multiple sites and disaster recovery in the event of full-site failure, and distributes the work of load balancing. Figure 24 illustrates a logical view of IOS SLB. Figure 24 Logical View of IOS SLB Real server Virtual server Real server Real server Catalyst 4840G with IOS SLB Client Client Client Client IOS SLB Functions and Capabilities Functions and capabilities supported in IOS SLB are described in the following sections: Algorithms for Server Load Balancing Port-Bound Servers Client-Assigned Load Balancing Content Flow Monitor Support Sticky Connections Maximum Connections Delayed Removal of TCP Connection Context TCP Session Reassignment Automatic Server Failure Detection Automatic Unfail Slow Start IPC-134

3 Configuring Server Load Balancing IOS SLB Functions and Capabilities SynGuard Dynamic Feedback Protocol for IOS SLB Alternate IP Addresses Transparent Web Cache Balancing NAT Redundancy Enhancement Stateless Backup Algorithms for Server Load Balancing IOS SLB provides two load-balancing algorithms: weighted round robin and weighted least connections. You may specify either algorithm as the basis for choosing a real server for each new connection request that arrives at the virtual server. Weighted Round Robin The weighted round robin algorithm specifies that the real server used for a new connection to the virtual server is chosen from the server farm in a circular fashion. Each real server is assigned a weight, n, that represents its capacity to handle connections, as compared to the other real servers associated with the virtual server. That is, new connections are assigned to a given real server n times before the next real server in the server farm is chosen. For example, assume a server farm comprises real server ServerA with n = 3, ServerB with n = 1, and ServerC with n = 2. The first three connections to the virtual server are assigned to ServerA, the fourth connection to ServerB, and the fifth and sixth connections to ServerC. Note Assigning a weight of n = 1 to all of the servers in the server farm configures the IOS SLB switch to use a simple round robin algorithm. Weighted Least Connections The weighted least connections algorithm specifies that the next real server chosen from a server farm for a new connection to the virtual server is the server with the fewest number of active connections. Each real server is assigned a weight for this algorithm also. When weights are assigned, the server with the fewest number of connections is based on the number of active connections on each server, and on the relative capacity of each server. The capacity of a given real server is calculated as the assigned weight of that server divided by the sum of the assigned weights of all of the real servers associated with that virtual server, or n 1 /(n 1 + n 2 + n 3...). For example, assume a server farm comprises real server ServerA with n = 3, ServerB with n = 1, and ServerC with n = 2. ServerA would have a calculated capacity of 3/( ), or half of all active connections on the virtual server, ServerB one-sixth of all active connections, and ServerC one-third of all active connections. At any point in time, the next connection to the virtual server would be assigned to the real server whose number of active connections is farthest below its calculated capacity. Note Assigning a weight of n = 1 to all of the servers in the server farm configures the IOS SLB switch to use a simple least-connection algorithm. IPC-135

4 IOS SLB Functions and Capabilities Configuring Server Load Balancing Port-Bound Servers When you define a virtual server, you must specify the TCP or UDP port handled by that virtual server. However, if you configure NAT on the server farm, you can also configure port-bound servers. Port-bound servers allow one virtual server IP address to represent one set of real servers for one service, such as HTTP, and a different set of real servers for another service, such as Telnet. Packets destined for a virtual server address for a port that is not specified in the virtual server definition are not redirected. IOS SLB supports both port-bound and nonport-bound servers, but port-bound servers are recommended. Client-Assigned Load Balancing Client-assigned load balancing allows you to limit access to a virtual server by specifying the list of client IP subnets that are permitted to use that virtual server. With this feature, you can assign a set of client IP subnets (such as internal subnets) connecting to a virtual IP address to one server farm, and assign another set of clients (such as external clients) to a different server farm. Content Flow Monitor Support IOS SLB supports the Cisco Content Flow Monitor (CFM), a Web-based status monitoring application within the CiscoWorks2000 product family. You can use CFM to manage Cisco server load-balancing devices. CFM runs on Windows NT and Solaris workstations, and is accessed using a Web browser. Sticky Connections When you use sticky connections, new connections from a client IP address or subnet are assigned to the same real server as were previous connections from that address or subnet. IOS SLB creates sticky objects to track client assignments. The sticky objects remain in the IOS SLB database after the last sticky connection is deleted, for a period defined by a configurable sticky timer. If the timer is configured on a virtual server, new connections from a client are sent to the same real server that handled the previous client connection, provided one of the following conditions is true: A connection for the same client already exists. The amount of time between the end of a previous connection from the client and the start of the new connection is within the timer duration. Sticky connections also permit the coupling of services that are handled by more than one virtual server. This allows connection requests for related services to use the same real server. For example, Web server (HTTP) typically uses TCP port 80, and HTTP over Secure Socket Layer (HTTPS) uses port 443. If HTTP virtual servers and HTTPS virtual servers are coupled, connections for ports 80 and 443 from the same client IP address or subnet are assigned to the same real server. Maximum Connections The maximum connections feature allows you to configure a limit on the number of active connections that a real server can handle. IPC-136

5 Configuring Server Load Balancing IOS SLB Functions and Capabilities Delayed Removal of TCP Connection Context Because of IP packet ordering anomalies, IOS SLB might see the termination of a TCP connection (a finish [FIN] or reset [RST]) followed by other packets for the connection. This problem usually occurs when there are multiple paths that the TCP connection packets can follow. To correctly redirect the packets that arrive after the connection is terminated, IOS SLB retains the TCP connection information, or context, for a specified length of time. The length of time the context is retained after the connection is terminated is controlled by a configurable delay timer. TCP Session Reassignment IOS SLB tracks each TCP SYN sent to a real server by a client attempting to open a new connection. If several consecutive SYNs are not answered, or if a SYN is replied to with an RST, the TCP session is reassigned to a new real server. The number of SYN attempts is controlled by a configurable reassign threshold. Automatic Server Failure Detection IOS SLB automatically detects each failed TCP connection attempt to a real server, and increments a failure counter for that server. (The failure counter is not incremented if a failed TCP connection from the same client has already been counted.) If the failure counter of a server exceeds a configurable failure threshold, the server is considered out of service and is removed from the list of active real servers. Automatic Unfail When a real server fails and is removed from the list of active servers, it is assigned no new connections for a length of time specified by a configurable retry timer. After that timer expires, the server is again eligible for new virtual server connections and IOS SLB sends the server the next connection for which it qualifies. If the connection is successful, the failed server is again placed back on the list of active real servers. If the connection is unsuccessful, the server remains out of service and the retry timer is reset. Slow Start In an environment that uses weighted least connections load balancing, a real server that is placed in service initially has no connections, and could therefore be assigned so many new connections that it becomes overloaded. To prevent such an overload, the slow start feature controls the number of new connections that are directed to a real server that has just been placed in service. SynGuard The SynGuard feature limits the rate of TCP SYNs handled by a virtual server to prevent a type of network problem known as a SYN flood denial-of-service attack. A user might send a large number of SYNs to a server, which could overwhelm or crash the server, denying service to other users. SynGuard prevents such an attack from bringing down IOS SLB or a real server. SynGuard monitors the number of SYNs to a virtual server over a specific time interval and does not allow the number to exceed a configured SYN threshold. If the threshold is reached, any new SYNs are dropped. IPC-137

6 IOS SLB Functions and Capabilities Configuring Server Load Balancing Dynamic Feedback Protocol for IOS SLB The IOS SLB Dynamic Feedback Protocol (DFP) is a mechanism that allows host agents in load-balanced environments to dynamically report the change in status of the host systems that provide a virtual service. The status reported is a relative weight that specifies the capacity of a host server to perform work. Alternate IP Addresses IOS SLB enables you to Telnet to the load-balancing device using an alternate IP address. To do so, use either of the following methods: Use any of the interface addresses to Telnet to the load-balancing device. Define a secondary IP address to Telnet to the load-balancing device. This function is similar to that provided by the LocalDirector (LD) Alias command. Transparent Web Cache Balancing You can balance transparent Web caches if you know in advance the IP addresses they are serving. In IOS SLB, configure the IP addresses, or some common subset of them, as virtual servers. Note A Web cache can start its own connections to real sites if pages are not available in its cache. Those connections cannot be load balanced back to the same set of caches. IOS SLB addresses this situation by allowing you to configure client exclude statements so that IOS SLB does not load balance connections initiated by the Web caches. NAT Cisco IOS Network Address Translation (NAT), RFC 1631, allows unregistered private IP addresses to connect to the Internet by translating them into globally registered IP addresses. Cisco IOS NAT also increases network privacy by hiding internal IP addresses from external networks. IOS SLB can operate in one of two redirection modes: Directed mode The virtual server can be assigned an IP address that is not known to any of the real servers. IOS SLB translates packets exchanged between a client and real server, translating the virtual server IP address to a real server address via NAT. Dispatched mode The virtual server address is known to the real servers; you must configure the virtual server IP address as a loopback address, or secondary IP address, on each real server. IOS SLB redirects packets to the real servers at the media access control (MAC) layer. Because the virtual server IP address is not modified in dispatched mode, the real servers must be Layer 2 adjacent to IOS SLB, or intervening routers might not be able to route to the chosen real server. The main advantage of dispatched mode is performance. In dispatched mode, the Layer 3 and Layer 4 addresses are not modified, which means IP header checksum adjustment occurs quickly, and checksum adjustment or recalculation for TCP or UDP is not required. Dispatched mode is also simpler than in directed mode because packets for applications with IP addresses in the packet need not be examined and modified. IPC-138

7 Configuring Server Load Balancing Restrictions The main disadvantage of dispatched mode is that the virtual server IP address is not modified, which means that the real servers must be Layer 2 adjacent with the load balancer or intervening routers may not be able to route to the chosen real server. NAT (directed mode) is used to solve these dispatched mode problems. IOS SLB currently supports only server NAT. By replacing the virtual server IP address with the real server IP address (and vice versa), servers can be many hops away from the load balancer and intervening routers can route to them without requiring tunneling. Additionally, loopback and secondary interfaces need no longer be on the real server. Note On the Catalyst 6000 family switches and Cisco 7200 series routers, if an IP address is configured as a real IP address for a NAT virtual server, you cannot balance connection requests from that address to a different virtual server (whether NAT or dispatch) on the same load balancer. The network designer must ensure that outbound packets travel through IOS SLB using one of the following methods: Direct wiring (all packets flow through a branch office IOS SLB device) Default gateways or policy-based routing IOS SLB NAT of client addresses, enabled as an outbound feature on server-side interfaces A less common form of server NAT is server port translation, which involves replacement of a virtual server port. Server port translation does not require server IP address translation, but the two translations can be used together. Redundancy Enhancement Stateless Backup An IOS SLB could represent a point of failure and the servers could lose their connections to the backbone if power fails, or if a link from a switch to the distribution-layer switch is disconnected. IOS SLB supports a stateless backup option you can use to reduce that risk. Stateless backup, based on the Hot Standby Router Protocol (HSRP), provides high network availability by routing IP flows from hosts on Ethernet networks without relying on the availability of a single Layer 3 switch. HSRP is configured on Layer 3 switches that run IP over Ethernet. If a Layer 3 switch fails, HSRP automatically allows another Layer 3 switch to assume the function of the failing switch. HSRP is therefore particularly useful when you require continuous access to resources in the network. HSRP is compatible with Internetwork Packet Exchange (IPX) from Novell and with AppleTalk. Note To avoid any single point of failure in an IOS SLB network, use multiple Layer 2 switches to provide connectivity between the IOS SLB devices and the servers. Restrictions IOS SLB has the following restrictions: Operates in a standalone mode and currently does not operate as a MultiNode Load Balancing (MNLB) Services Manager. The presence of IOS SLB does not preclude the use of the existing MNLB Forwarding Agent with an external Services Manager in an MNLB environment. IPC-139

8 IOS SLB Configuration Task List Configuring Server Load Balancing Does not support coordinating server load-balancing statistics among different IOS SLB instances for backup capability. Supports FTP only in dispatched mode. Does not support load balancing of flows between clients and real servers that are on the same LAN VLAN. Does not support IOS SLB and Cisco Applications and Services Architecture (CASA) configured with the same virtual IP address, even if they are for different services. Supports Cisco IOS NAT in directed mode with no hardware data packet acceleration. (Hardware data packet acceleration is performed by the Policy Feature Card (PFC), and in directed mode the data packets are handled by the Multilayer Switched Feature Card (MSFC), not the PFC.) Catalyst 6000 family switch restrictions are as follows: Requires the MSFC and the PFC. Requires that the Multilayer Switching (MLS) flow mode be set to full. For more information about how to set the MLS flow, refer to the Configuring IP Multilayer Switching section in the Catalyst 6000 Family MSFC (12.0) & PFC Configuration Guide, Release 5.4. When IOS SLB is operating in dispatched mode, real servers must be Layer 2-adjacent to the IOS SLB switch (that is, not beyond an additional router), with hardware data packet acceleration performed by the PFC. All real servers that can be reached by a single IOS SLB device must be on the same VLAN. The loopback address must be configured in the real servers. When IOS SLB is operating in directed mode with server NAT, real servers need not be Layer 2-adjacent to the IOS SLB switch. This allows for more flexible network design, because servers can be placed several Layer 3 hops away from the IOS SLB switch. Requires that all real servers that can be reached by a single IOS SLB device must be on the same VLAN. The loopback address must be configured in the real servers. Supports NativeIOS only and C6sup-is-mz images. Cisco 7200 series restrictions are as follows: In dispatched mode, the servers must be Layer 2-adjacent or tag-switched. In directed mode, the servers can be one or more hops away. Supports Cisco IOS NAT in directed mode with no hardware data packet acceleration. Provides no hardware acceleration for the IOS SLB function for either dispatched mode or directed mode. Supports C7200-is-mz images. IOS SLB Configuration Task List Configuring IOS SLB involves identifying server farms, configuring groups of real servers in server farms, and configuring the virtual servers that represent the real servers to the clients. To configure the IOS SLB feature, perform the tasks described in the following sections in the order listed. Some tasks are required; others are optional. Specifying a Server Farm (Required) Specifying a Load-Balancing Algorithm (Optional) Specifying a Bind ID (Optional) Specifying a Real Server (Required) Configuring Real Server Attributes (Optional) IPC-140

9 Configuring Server Load Balancing IOS SLB Configuration Task List Enabling the Real Server for Service (Required) Specifying a Virtual Server (Required) Associating a Virtual Server with a Server Farm (Required) Configuring Virtual Server Attributes (Required) Adjusting Virtual Server Values (Optional) Preventing Advertisement of Virtual Server Address (Optional) Enabling the Virtual Server for Service (Required) Configuring IOS SLB Dynamic Feedback Protocol (Optional) Configuring NAT (Optional) Implementing IOS SLB Stateless Backup (Optional) Verifying IOS SLB (Optional) Troubleshooting IOS SLB (Optional) Specifying a Server Farm Grouping real servers into server farms is an essential part of IOS SLB. Using server farms enables IOS SLB to assign new connections to the real servers based on their weighted capacities, and on the load-balancing algorithms used. To configure a server farm, use the following command in global configuration mode: Router(config)# ip slb serverfarm serverfarm-name Adds a server farm definition to the IOS SLB configuration and initiates SLB server farm configuration mode. Specifying a Load-Balancing Algorithm To determine which real server to use for each new connection request, the IOS SLB feature uses one of two load-balancing algorithms: weighted round robin (the default) or weighted least connections. (See the Weighted Round Robin section or the Weighted Least Connections section for detailed descriptions of these algorithms.) To specify the load-balancing algorithm, use the following command in SLB server farm configuration mode: Router(config-slb-sfarm)# predictor [roundrobin leastconns] Specifies whether the weighted round robin algorithm or the weighted least connections algorithm is to be used to determine how a real server is selected. IPC-141

10 IOS SLB Configuration Task List Configuring Server Load Balancing Specifying a Bind ID To configure a bind ID on the server farm for use by DFP, use the following command in SLB server farm configuration mode: Router(config-slb-sfarm)# bindid [bind_id] Specifies a bind ID on the server farm for use by DFP. Specifying a Real Server A server farm comprises a number of real servers. The real servers are the physical devices that provide the load-balanced services. To identify a real server in your network, use the following command inslb server farm configuration mode: Router(config-slb-sfarm)# real ip-address Identifies a real server to the IOS SLB function and initiates real server configuration mode. Configuring Real Server Attributes To configure real server attributes, use the following commands in SLB real server configuration mode: Router(config-slb-real)# faildetect numconns number-conns [numclients number-clients] Router(config-slb-real)# maxconns maximum-number Router(config-slb-real)# reassign threshold Router(config-slb-real)# retry retry-value Router(config-slb-real)# weight weighting-value Specifies the number of consecutive connection failures and, optionally, the number of unique client connection failures, that constitute failure of the real server. Specifies the maximum number of active connections allowed on the real server at one time. Specifies the number of consecutive unanswered SYNs that initiates assignment of the connection to a different real server. Specifies the interval (in seconds) to wait between the detection of a server failure and the next attempt to connect to the failed server. Specifies the workload capacity of the real server relative to other servers in the server farm. IPC-142

11 Configuring Server Load Balancing IOS SLB Configuration Task List Enabling the Real Server for Service To place the real server into service, use the following command in SLB real server configuration mode: Router(config-slb-real)# Enables the real server for use by IOS SLB. Specifying a Virtual Server To specify a virtual server, use the following command in global configuration mode: Router(config)# ip slb vserver virtserver-name Identifies a virtual server and enters SLB virtual server configuration mode. Associating a Virtual Server with a Server Farm To associate the virtual server with a server farm, use the following command in SLB virtual server configuration mode: Router(config-slb-vserver)# serverfarm serverfarm-name Associates a real server farm with a virtual server. Configuring Virtual Server Attributes To configure virtual server attributes, use the following command in SLB virtual server configuration mode: Router(config-slb-vserver)# virtual ip-address {tcp udp} port-number [service service-name] Specifies the virtual server IP address, type of connection, port number, and optional service coupling. IPC-143

12 IOS SLB Configuration Task List Configuring Server Load Balancing Adjusting Virtual Server Values To change the default settings of the virtual server values, use the following commands in SLB virtual server configuration mode as needed: Router(config-slb-vserver)# client ip-address network-mask Router(config-slb-vserver)# delay duration Router(config-slb-vserver)# idle duration Router(config-slb-vserver)# sticky duration [group group-id] Router(config-slb-vserver)# synguard syn-count interval Specifies which clients are allowed to use the virtual server. Specifies the amount of time IOS SLB maintains TCP connection context after a connection has terminated. The default value is 10 seconds. Specifies the minimum amount of time IOS SLB maintains connection context in the absence of packet activity. The default value is 3600 seconds (1 hour). Specifies that connections from the same client use the same real server, as long as the interval between client connections does not exceed the specified duration. Specifies the rate of TCP SYNs handled by a virtual server in order to prevent a SYN flood denial-of -service attack. Preventing Advertisement of Virtual Server Address By default, virtual server addresses are advertised. That is, static routes to the Null0 interface are installed for the virtual server addresses. To advertise these static routes using the routing protocol, you must configure redistribution of static routes for the routing protocol. To prevent the installation of a static route, use the following command in SLB virtual server configuration mode: Router(config-slb-vserver)# no advertise Omits the virtual server IP address from the routing protocol updates. Enabling the Virtual Server for Service To place the virtual server into service, use the following command in SLB virtual server configuration mode: Router(config-slb-vserver)# Enables the virtual server for use by IOS SLB. IPC-144

13 Configuring Server Load Balancing IOS SLB Configuration Task List Configuring IOS SLB Dynamic Feedback Protocol To configure IOS SLB DFP, use the following commands beginning in global configuration mode: Step 1 Step 2 Router(config)# ip slb dfp [password password [timeout]] Router(config-slb-dfp)# agent ip-address port [timeout [retry-count [retry-interval]]] Configures DFP and, optionally, sets a password and initiates SLB DFP configuration mode. Configures a DFP agent. Configuring NAT To configure IOS SLB NAT mode for a specific server farm, use the following commands beginning in global configuration mode: Step 1 Router(config)# ip slb serverfarm serverfarm-name Adds a server farm definition to the IOS SLB configuration and initiates server farm configuration mode. Step 2 Router(config-slb-sfarm)# nat server Configures server NAT. Step 3 Router(config-slb-sfarm)# real ip-address Identifies a real server to the IOS SLB function and initiates real server configuration mode. Implementing IOS SLB Stateless Backup Stateless backup, based on the Hot Standby Router Protocol (HSRP), provides high network availability by routing IP flows from hosts on Ethernet networks without relying on the availability of any single Layer 3 switch. Stateless backup is particularly useful for hosts that do not support a router discovery protocol (such as the Intermediate System-to-Intermediate System [IS-IS] Interdomain Routing Protocol [IDRP]) and do not have the functionality to shift to a new Layer 3 switch when their selected Layer 3 switch reloads or loses power. How IOS SLB Stateless Backup Works A Layer 3 switch running HSRP detects a failure by sending and receiving multicast UDP hello packets. When the IOS SLB switch running HSRP detects that the designated active Layer 3 switch has failed, the selected backup Layer 3 switch assumes control of the HSRP group MAC and IP addresses. (You can also select a new standby Layer 3 switch at that time.) Both the primary and the backup Layer 3 switch must be on the same subnetwork. The chosen MAC and IP addresses must be unique and must not conflict with any others on the same network segment. The MAC address is selected from a pool of Cisco MAC addresses. Configure the last byte of the MAC address by using the HSRP group number. When HSRP is running, it selects an active Layer 3 switch and instructs its device layer to listen on an additional (dummy) MAC address. IOS SLB switching software supports HSRP over 10/100 Ethernet, Gigabit Ethernet, FEC, GEC, and Bridge Group Virtual Interface (BVI) connections. IPC-145

14 IOS SLB Configuration Task List Configuring Server Load Balancing HSRP uses a priority scheme to determine which HSRP-configured Layer 3 switch is to be the default active Layer 3 switch. To configure a Layer 3 switch as active, you assign it a priority higher than that of all other HSRP-configured Layer 3 switches. The default priority is 100, so if you configure just one Layer 3 switch to have a higher priority, that switch becomes the default active switch. HSRP works by the exchange of multicast messages that advertise priority among HSRP-configured Layer 3 switches. When the active switch fails to send a hello message within a configurable period, the standby switch with the highest priority becomes the active switch. The transition of packet-forwarding functions between Layer 3 switches is completely transparent to all hosts accessing the network. HSRP-configured Layer 3 switches exchange the following types of multicast messages: Hello The hello message conveys the HSRP priority and state information of the switch. By default, an HSRP switch sends hello messages every 3 seconds. Coup When a standby Layer 3 switch assumes the function of the active switch, it sends a coup message. Resign The active Layer 3 switch sends a resign message when it is about to shut down or when a switch that has a higher priority sends a hello message. At any time, HSRP-configured Layer 3 switches are in one of the following states: Active The switch is performing packet-transfer functions. Standby The switch is prepared to assume packet-transfer functions if the active router fails. Speaking and listening The switch is sending and receiving hello messages. Listening The switch is receiving hello messages. Configuring IOS SLB Stateless Backup To configure stateless backup, perform the following tasks. The first task is required; the second task is optional: Configure IOS SLB switches to run HSRP between interfaces on the server side Configure multiple IOS SLB switches that share a virtual IP address as long as the client ranges are exclusive and you use policy routing to forward the flows to the correct IOS SLB switch To configure stateless backup over VLANs between IOS SLB switches, perform the following steps: Step 1 Step 2 Step 3 Configure the server farms. See the Specifying a Server Farm section earlier in this chapter. Configure the real servers. See the Specifying a Real Server section earlier in this chapter. Configure the virtual servers. See the Specifying a Virtual Server section earlier in this chapter. Note When you use the (virtual service) command to configure the virtual server as in-service you must use the optional standby interface configuration command and configure an HSRP group name. Step 4 Step 5 Step 6 Configure the IP routing protocol. See the IP Routing Protocols part of the Cisco IOS IP Configuration Guide. Configure the VLAN between the switches. See the Virtual LANs chapter of the Cisco IOS Switching Services Configuration Guide. Enable HSRP. See the Enabling HSRP section earlier in this chapter. IPC-146

15 Configuring Server Load Balancing IOS SLB Configuration Task List Step 7 Step 8 Customize group attributes. See the Customizing Group Attributes section earlier in this chapter. Verify the IOS SLB HSRP configuration. See the Verifying the IOS SLB Stateless Backup Configuration section earlier in this chapter. A sample stateless backup configuration is shown in the IOS SLB Stateless Backup Configuration Example section. Enabling HSRP To enable HSRP on an IOS SLB interface, enable the protocol, then customize it for the interface. Use the following command in interface configuration mode: Router(config-if)# standby [group-number] ip [ip-address [secondary]] Enables HSRP. Customizing Group Attributes To customize Hot Standby group attributes, use the following commands in interface configuration mode as needed: Router(config-if)# standby [group-number] authentication string Router(config-if)# standby [group-number] name group-name Router(config-if)# standby [group-number] preempt Router(config-if)# standby [group-number] priority priority Router(config-if)# standby [group-number] timers hellotime holdtime Router(config-if)# standby [group-number] track type-number [interface-priority] Selects an authentication string to be carried in all HSRP messages. Specifies an HSRP group name with which to associate an IOS SLB interface. Specifies that if the local router has priority over the current active router, the local router should attempt to take its place as the active router. Sets the Hot Standby priority used to choose the active router. Configures the time between hello packets and the hold time before other routers declare the active router to be down. Configures the interface to track other interfaces, so that if one of the other interfaces goes down the Hot Standby priority for the device is lowered. Verifying the IOS SLB Stateless Backup Configuration To verify that stateless backup has been configured and is operating correctly, use the following show ip slb vservers EXEC commands to display information about the IOS SLB virtual server status: Router# show ip slb vservers slb vservers prot virtual state conns IPC-147

16 IOS SLB Configuration Task List Configuring Server Load Balancing VS1 TCP :23 INSERVICE 2 VS2 TCP :23 INSERVICE 2 Router# show ip slb vservers detail VS1, state = INSERVICE, v_index = 10 virtual = :23, TCP, service = NONE, advertise = TRUE server farm = SERVERGROUP1, delay = 10, idle = 3600 sticky timer = 0, sticky subnet = sticky group id = 0 synguard counter = 0, synguard period = 0 conns = 0, total conns = 0, syns = 0, syn drops = 0 standby group = None VS2, state = INOFSERVICE, v_index = 11 virtual = :23, TCP, service = NONE, advertise = TRUE server farm = SERVERGROUP2, delay = 10, idle = 3600 sticky timer = 0, sticky subnet = sticky group id = 0 synguard counter = 0, synguard period = 0 conns = 0, total conns = 0, syns = 0, syn drops = 0 standby group = None Verifying IOS SLB Verifying IOS SLB Installation The following sections describe how to verify the following different aspects of the IOS SLB feature: Verifying IOS SLB Installation Verifying Server Failure Detection To verify that the IOS SLB is installed and working properly, perform the following steps: Step 1 Step 2 Step 3 Step 4 Step 5 Telnet to the IOS SLB device. Ping from that device to each of the clients and real servers. If it is not precluded by firewalls or network configuration, ping from the client side to each of the real servers. From the client side, ping the virtual server. Pings are answered by IOS SLB even if no real servers are in service, so this ensures that the IOS SLB device is reachable. For the selected protocol, start a client connection to the virtual server. If you want sticky connections, perform the following steps: a. Configure the sticky connections. b. Start a client connection. c. Enter the show ip slb reals detail and show ip slb conns EXEC commands. d. Examine the real server connection counts. The real server whose count increased is the one to which the client connection is assigned. e. Enter the show ip slb sticky EXEC command to display the sticky relationships that IOS SLB stored. f. End the connection. g. Ensure that the connection count of the real server decreased. IPC-148

17 Configuring Server Load Balancing IOS SLB Configuration Task List Step 6 Step 7 Step 8 h. Restart the connection, after waiting no longer than the sticky timeout value. i. Enter the show ip slb conns EXEC command again. j. Examine the real server connection counts again, and verify that the sticky connection is assigned to the same real server as before. Start additional client connections. Enter the show ip slb reals detail EXEC command. Verify that the the connection counts are increasing. Verifying Server Failure Detection To verify that server failures are detected correctly, perform the following steps: Step 1 Step 2 Step 3 Use a large client population. If the number of clients is very small, tune the numclients keyword on the faildetect SLB real server configuration command so that the servers are not displayed as failed. Enter the show ip slb reals detail EXEC command to show the status of the real servers. Examine the status and connection counts of the real servers: Servers that failed show a status of failed, testing, orready_to_test, based on whether IOS SLB is checking that the server came back up when the command was sent. When a real server fails, connections that are assigned but not established (no SYN or ACK is received) are reassigned to another real server on the first inbound SYN after the reassign threshold is met. However, any connections that were already established are forwarded to the same real server because, although it may not be accepting new connections, it may be servicing existing ones. For weighted least connections, a real server that has just been placed in service starts slowly so that it is not overloaded with new connections. (See the Slow Start section for more information on this feature.) Therefore, the connection counts displayed for a new real server show connections going to other real servers (despite the lower count of the new real server). The connection counts also show dummy connections to the new real server, which IOS SLB uses to artificially inflate the connection counts for the real server during the slow start period. IPC-149

18 IOS SLB Configuration Task List Configuring Server Load Balancing Troubleshooting IOS SLB Table 6 lists questions and answers that can help you troubleshoot IOS SLB. Table 6 IOS SLB Troubleshooting Guidelines Question Why can I connect to real servers directly, but not to the virtual server? Why is IOS SLB not marking my real server as failed when I disconnect it from the network? Why is IOS SLB not marking my connections as established even though I am transferring data? Why does IOS SLB show my real server as even though I have taken it down or physically disconnected it? Why is IOS SLB not balancing correctly? I am using dispatched mode, the servers are leaving sockets open, and I am seeing RSTs in response to a number of SYNs. Curiously, sometimes things work fine. Answer Make sure that the virtual IP address is configured as a loopback in each of the real servers (if you are running in dispatched mode). Tune the values for the numclients, numconns, and delay keywords. If you have a very small client population (for example, in a test environment), the numclients keyword could be causing the problem. This parameter prevents IOS SLB from mistaking the failure of a small number of clients for the failure of a real server. If you are using dispatched mode, make sure there are no alternate paths that allow outbound flows to bypass IOS SLB. Also, make sure that the clients and real servers are not on the same IP subnet. The and outofservice states indicate whether the network administrator intends for that real server to be used when it is operational. A real server that was but was removed from the selection list dynamically by IOS SLB as a result of automatic failure detection, is marked as failed. Use the show ip slb reals detail EXEC command to display these real server states. Beginning with Cisco IOS Release 12.1(1)E, the keyword is changed to operational, to better reflect actual condition. Enter the show mls flow command: Router# show mls flow current ip flowmask for unicast: full flow current ipx flowmask for unicast: destination only The current IP flowmask must be full flow. If it is not, correct the problem using the mls flow ip full global configuration command: Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# mls flow ip full Router(config)# IPC-150

19 Configuring Server Load Balancing Monitoring and Maintaining IOS SLB Monitoring and Maintaining IOS SLB To obtain and display run-time information about IOS SLB, use the following commands in EXEC mode as needed: Router# show ip slb conns [vservers virtserver-name] [client ip-address] [detail] Router# show ip slb dfp [agent ip-address port-number] [detail] [weights] Router# show ip slb reals [vservers virtserver-name] [detail] Router# show ip slb serverfarms [name serverfarm-name] [detail] Router# show ip slb stats Router# show ip slb sticky [client ip-address] Router# show ip slb vservers [name virtserver-name] [detail] Displays all connections handled by IOS SLB, or, optionally, only those connections associated with a particular virtual server or client. Displays information about DFP and DFP agents, and about the weights assigned to real servers. Displays information about the real servers defined to IOS SLB. Displays information about the server farms defined to IOS SLB. Displays IOS SLB statistics. Displays information about the sticky connections defined to IOS SLB. Displays information about the virtual servers defined to IOS SLB. Configuration Examples This section provides the following IOS SLB configuration examples: IOS SLB Network Configuration Example NAT Configuration Example HSRP Configuration Example IOS SLB Stateless Backup Configuration Example IPC-151

20 Configuration Examples Configuring Server Load Balancing IOS SLB Network Configuration Example This section provides a configuration example based on the network layout shown in Figure 25. Figure 25 IOS SLB Network Configuration Web server Web server Web server Restricted web server Restricted web server x Virtual server x Client Human Resources Client Client As shown in the following sample code, the example topology has three public Web servers and two restricted Web servers for privileged clients in subnet x. The public Web servers are weighted according to their capacity, with server having the lowest capacity and having a connection limit imposed on it. The restricted Web servers are configured as members of the same sticky group, so that HTTP connections and Secure Socket Layer (SSL) connections from the same client use the same real server. This configuration is coded as follows: ip slb serverfarm PUBLIC predictor leastconns real weight 16 real weight 4 maxconns 1000 real weight 24 Unrestricted Web server farm Use weighted least connections algorithm First real server Second real server Restrict maximum number of connections Third real server ip slb serverfarm RESTRICTED predictor leastconns real in-service real in-service Restricted Web server farm Use weighted least connections algorithm First real server Second real server IPC-152

21 Configuring Server Load Balancing Configuration Examples ip slb vservers PUBLIC_HTTP virtual tcp www serverfarm PUBLIC Unrestricted Web virtual server Handle HTTP requests Use public Web server farm ip slb vservers RESTRICTED_HTTP virtual tcp www serverfarm RESTRICTED client sticky 60 idle 120 group 1 Restricted HTTP virtual server Handle HTTP requests Use restricted Web server farm Only allow clients from x Couple connections with RESTRICTED_SSL ip slb vservers RESTRICTED_SSL virtual tcp https serverfarm RESTRICTED client sticky 60 idle 120 group 1 Restricted SSL virtual server Handle SSL requests Use restricted Web server farm Only allow clients from x Couple connections with RESTRICTED_HTTP NAT Configuration Example This section provides a configuration example based on the network layout shown in Figure 26. Figure 26 IOS SLB NAT Topology Server Server Server Server HTTP=80 HTTP=80 HTTP=80 HTTP1 = 8080 HTTP2 = 8081 HTTP3 = 8082 Switch A Switch B Switch C Clients The topology in Figure 26 has four Web servers, configured as follows: Servers 1, 2, and 3 are running single HTTP server applications listening on port 80. IPC-153

22 Configuration Examples Configuring Server Load Balancing Server 4 has multiple HTTP server applications listening on ports 8080, 8081, and Servers 1 and 2 are load balanced using Switch A, which is performing server address translation. Servers 3 and 4 are load balanced using Switches B and C. These two switches are performing server address translation. These switches also perform server port translation for HTTP packets to and from Server 4. The configuration statements for Switch A are as follows: ip slb serverfarm FARM1! Translate server addresses nat server! Server 1 port 80 real ! Server 2 port 80 real ! ip slb vservers HTTP1! Handle HTTP (port 80) requests virtual tcp www serverfarm FARM1 The configuration statements for Switch B are as follows: ip slb serverfarm FARM2! Translate server addresses nat server! Server 3 port 80 real ! Server 4 port 8080 real port 8080! Server 4 port 8081 real port 8081! Server 4 port 8082 real port 8082! ip slb vservers HTTP2! Handle HTTP (port 80) requests virtual tcp www serverfarm FARM2 The configuration statements for Switch C are as follows: ip slb serverfarm FARM2! Translate server addresses nat server! Server 3 port 80 real ! Server 4 port 8080 real port 8080! Server 4 port 8081 real port 8081! Server 4 port 8082 IPC-154

23 Configuring Server Load Balancing Configuration Examples real port 8082! ip slb vservers HTTP2! Handle HTTP (port 80) requests virtual tcp www serverfarm FARM2 HSRP Configuration Example Figure 27 shows the topology of an IP network with two Layer 3 switches configured for HSRP. The following conditions exist in this network: Device A is the active HSRP Layer 3 switch and handles packets to the real servers with IP addresses through Device B handles packets to real servers with IP addresses through All hosts accessing the network use the IP address of the virtual router (in this case, ). The configuration shown uses the Enhanced Interior Gateway Routing Protocol (Enhanced IGRP), but HSRP can be used with any other routing protocol supported by the Cisco IOS software, such as Open Shortest Path First (OSPF). Note Some configurations that use HSRP still require a routing protocol for convergence when a topology change occurs. The standby Layer 3 switch becomes active, but connectivity does not occur until convergence occurs. If the connection between Device A and the client accessing virtual IP fails, fast-converging routing protocols (such as Enhanced IGRP and OSPF) can respond within seconds, ensuring that Device B is prepared to transfer packets that would have gone through Device A. IPC-155

24 Configuration Examples Configuring Server Load Balancing Figure 27 HSRP Example Network Topology Client Gigabit Ethernet ISL between devices Gigabit Ethernet Virtual IP = Device A active Virtual IP = Device B standby Fast Ethernet Fast Ethernet Fast Ethernet Fast Ethernet WWW server WWW server WWW server WWW server The configuration for Device A is as follows: hostname Device A interface GigabitEthernet 41 ip address standby 1 ip standby 1 preempt standby 1 priority 110 standby 1 authentication denmark standby 1 timers 5 15 standby 1 name Web-Group interface FastEthernet 1 ip address router eigrp 1 network network Server farm = Public HSRP group = Web_Group Server farm = Public HSRP group = Web_Group The configuration for Device B is as follows: hostname Device B interface GigabitEthernet 41 ip address standby 1 ip standby 1 preempt standby 1 authentication denmark IPC-156

IOS Server Load Balancing

IOS Server Load Balancing IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported

More information

IOS Server Load Balancing

IOS Server Load Balancing IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported

More information

IOS Server Load Balancing

IOS Server Load Balancing IOS Server Load Balancing Feature History Release 12.0(7)XE 12.1(1)E Modification This feature was introduced with support for the following platforms: Catalyst 6000 Family Switches with Supervisor Engine

More information

Firewall Load Balancing

Firewall Load Balancing CHAPTER 6 This chapter describes the (FWLB) feature. It includes the following sections: FWLB Overview, page 6-1 FWLB Features, page 6-2 FWLB Configuration Tasks, page 6-3 Monitoring and Maintaining FWLB,

More information

Server Load Balancing Configuration Guide Cisco IOS Release 12.2SX

Server Load Balancing Configuration Guide Cisco IOS Release 12.2SX Server Load Balancing Configuration Guide Cisco IOS Release 12.2SX Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

GLBP - Gateway Load Balancing Protocol

GLBP - Gateway Load Balancing Protocol GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy

More information

Configuring Redundancy

Configuring Redundancy 7 CHAPTER This chapter describes how to configure redundancy and contains these sections: Configuring Fault Tolerance, page 7-1 Configuring HSRP, page 7-5 Configuring Interface and Device Tracking, page

More information

Cisco Networking Academy CCNP Multilayer Switching

Cisco Networking Academy CCNP Multilayer Switching CCNP3 v5 - Chapter 5 Cisco Networking Academy CCNP Multilayer Switching Implementing High Availability in a Campus Environment Routing issues Hosts rely on a router to find the best path Issues with established

More information

Configuring Static and Dynamic NAT Translation

Configuring Static and Dynamic NAT Translation This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER 6 This chapter describes how to configure the health monitoring on the CSM and contains these sections: Configuring Probes for Health Monitoring, page 6-1 Configuring Route Health Injection, page

More information

First Hop Redundancy (Layer 3) 1. Network Design First Hop. Agenda. First Hop Redundancy (Layer 3) 2. L102 - First Hop Redundancy

First Hop Redundancy (Layer 3) 1. Network Design First Hop. Agenda. First Hop Redundancy (Layer 3) 2. L102 - First Hop Redundancy First Hop Redundancy (Layer 3) 1 Network Design First Hop First Hop Redundancy, Server Redundancy The problem: How can local routers be recognized by IP hosts? Note: Normally IP host has limited view of

More information

CCNP Switch 642-813 Questions/Answers Implementing High Availability and Redundancy

CCNP Switch 642-813 Questions/Answers Implementing High Availability and Redundancy Which Catalyst 6500 switch component integrates on individual line modules as well as on the supervisor engine? A. CPU B. Flash C. ASIC D. NVRAM Answer: C Cisco Catalyst 6500 Series with Cisco IOS Software

More information

Layer 3 Redundancy with HSRP By Sunset Learning Instructor Andrew Stibbards

Layer 3 Redundancy with HSRP By Sunset Learning Instructor Andrew Stibbards Layer 3 Redundancy with HSRP By Sunset Learning Instructor Andrew Stibbards Hot Standby Router Protocol (HSRP) is a Cisco proprietary protocol which allows several routers or multilayer switches to appear

More information

- Redundancy and Load Balancing -

- Redundancy and Load Balancing - 1 - Redundancy and Load Balancing - Importance of Redundancy High availability is critical in most environments. Even a brief outage due to hardware failure may be considered unacceptable. Consider the

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless

More information

IP Application Services Commands show vrrp. This command was introduced. If no group is specified, the status for all groups is displayed.

IP Application Services Commands show vrrp. This command was introduced. If no group is specified, the status for all groups is displayed. show vrrp show vrrp To display a brief or detailed status of one or all configured Virtual Router Redundancy Protocol (VRRP) groups on the router, use the show vrrp command in privileged EXEC mode. show

More information

Configuring the Transparent or Routed Firewall

Configuring the Transparent or Routed Firewall 5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing

More information

Overview: Load Balancing with the MNLB Feature Set for LocalDirector

Overview: Load Balancing with the MNLB Feature Set for LocalDirector CHAPTER 1 Overview: Load Balancing with the MNLB Feature Set for LocalDirector This chapter provides a conceptual overview of load balancing and introduces Cisco s MultiNode Load Balancing (MNLB) Feature

More information

VRRPv3: Object Tracking Integration

VRRPv3: Object Tracking Integration Virtual Router Redundancy Protocol (VRRP) enables a group of devices to form a single virtual device to provide redundancy. The LAN clients then can be configured with the virtual device as the default

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Configuring Enhanced Object Tracking

Configuring Enhanced Object Tracking Configuring Enhanced Object Tracking First Published: May 2, 2005 Last Updated: July 1, 2009 Before the introduction of the Enhanced Object Tracking feature, the Hot Standby Router Protocol (HSRP) had

More information

Configuring IKEv2 Load Balancer

Configuring IKEv2 Load Balancer The IKEv2 Load Balancer feature provides support for enabling clusters of FlexVPN gateways and distributes incoming Internet Key Exchange Version 2 (IKEv2) connection requests among FlexVPN gateways. This

More information

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram

More information

Server Iron Hands-on Training

Server Iron Hands-on Training Server Iron Hands-on Training Training Session Agenda Server Iron L4 Solutions Server Iron L7 Solutions Server Iron Security Solutions High Availability Server Iron Designs 2 Four Key Reasons for Server

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Configuring Advanced Server Load Balancing

Configuring Advanced Server Load Balancing CHAPTER 5 This chapter describes how to configure advanced server load balancing (SLB) on the CSM and contains these sections: Configuring URL Hashing, page 5-1 Configuring Firewall Load Balancing, page

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

NetFlow Subinterface Support

NetFlow Subinterface Support NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the

More information

Network Protocol Configuration

Network Protocol Configuration Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring

More information

Table of Contents. Cisco How Does Load Balancing Work?

Table of Contents. Cisco How Does Load Balancing Work? Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Configuring EtherChannels

Configuring EtherChannels CHAPTER 12 This chapter describes how to configure EtherChannels on the Cisco 7600 series router Layer 2 or Layer 3 LAN ports. For complete syntax and usage information for the commands used in this chapter,

More information

Link Load Balancing 2015-04-28 08:50:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Link Load Balancing 2015-04-28 08:50:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Link Load Balancing 2015-04-28 08:50:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Link Load Balancing... 3 Link Load Balancing... 4 Configuring

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

Configuring TCP Intercept (Preventing Denial-of-Service Attacks)

Configuring TCP Intercept (Preventing Denial-of-Service Attacks) Configuring TCP Intercept (Preventing Denial-of-Service Attacks) This chapter describes how to configure your router to protect TCP servers from TCP SYN-flooding attacks, a type of denial-of-service attack.

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

RESILIENT NETWORK DESIGN

RESILIENT NETWORK DESIGN Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, igregr@fit.vutbr.cz Campus Best Practices - Resilient network design Campus

More information

Configuring a Load-Balancing Scheme

Configuring a Load-Balancing Scheme Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure

More information

Configuring IP Load Sharing in AOS Quick Configuration Guide

Configuring IP Load Sharing in AOS Quick Configuration Guide Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.

More information

FWSM introduction Intro 5/1

FWSM introduction Intro 5/1 Intro 5/0 Content: FWSM introduction Requirements for FWSM 3.2 How the Firewall Services Module Works with the Switch Using the MSFC Firewall Mode Overview Stateful Inspection Overview Security Context

More information

Cisco IOS Server Load Balancing and the Catalyst 6000 Family of Switches

Cisco IOS Server Load Balancing and the Catalyst 6000 Family of Switches WHITE PAPER Cisco IOS Server Load Balancing and the Catalyst 6000 Family of Switches The Catalyst 6000 family, which includes the Catalyst 6500 and the Catalyst 6000 series, delivers high-performance,

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

OSPF Routing Protocol

OSPF Routing Protocol OSPF Routing Protocol Contents Introduction Network Architecture Campus Design Architecture Building Block Design Server Farm Design Core Block Design WAN Design Architecture Protocol Design Campus Design

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

Flow-Based per Port-Channel Load Balancing

Flow-Based per Port-Channel Load Balancing The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.

More information

Content Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router

Content Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router Content Switching Module for the Catalyst 6500 and Cisco 7600 Internet Router Product Overview The Cisco Content Switching Module (CSM) is a Catalyst 6500 line card that balances client traffic to farms

More information

AS/400e. TCP/IP routing and workload balancing

AS/400e. TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000. All rights reserved. US Government Users Restricted

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Exam Name: Foundry Networks Certified Layer4-7 Professional Exam Type: Foundry Exam Code: FN0-240 Total Questions: 267

Exam Name: Foundry Networks Certified Layer4-7 Professional Exam Type: Foundry Exam Code: FN0-240 Total Questions: 267 Question: 1 SYN-Guard and SYN-Defense can be configured on: A. ServerIron XL B. ServerIron 100 C. ServerIron 400 D. ServerIron 800 E. ServerIron 450 F. ServerIron 850 G. ServerIron GT-E, C, D, E, F, G

More information

Configuring a Load-Balancing Scheme

Configuring a Load-Balancing Scheme This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Enabling NetFlow and NetFlow Data Export (NDE) on Cisco Catalyst Switches

Enabling NetFlow and NetFlow Data Export (NDE) on Cisco Catalyst Switches Enabling NetFlow and NetFlow Data Export (NDE) on Cisco Catalyst Switches Revised 2/1/2007 Introduction...2 Requirements...2 Catalyst 4500 Series...2 Enabling NetFlow...2 Configuring a NetFlow Destination...3

More information

Routing Security Server failure detection and recovery Protocol support Redundancy

Routing Security Server failure detection and recovery Protocol support Redundancy Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting

More information

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap

Outline VLAN. Inter-VLAN communication. Layer-3 Switches. Spanning Tree Protocol Recap Outline Network Virtualization and Data Center Networks 263-3825-00 DC Virtualization Basics Part 2 Qin Yin Fall Semester 2013 More words about VLAN Virtual Routing and Forwarding (VRF) The use of load

More information

Configuring Network Address Translation

Configuring Network Address Translation CHAPTER5 Configuring Network Address Translation The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter contains the following major sections

More information

Table of Contents. Configuring IP Access Lists

Table of Contents. Configuring IP Access Lists Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

Virtual Fragmentation Reassembly

Virtual Fragmentation Reassembly Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments

More information

Firewall Load Balancing

Firewall Load Balancing Firewall Load Balancing 2015-04-28 17:50:12 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Firewall Load Balancing... 3 Firewall Load Balancing...

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Configuring DHCP Snooping and IP Source Guard

Configuring DHCP Snooping and IP Source Guard CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and IP Source Guard on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch

DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch DATA CENTER Best Practices for High Availability Deployment for the Brocade ADX Switch CONTENTS Contents... 2 Executive Summary... 3 Introduction... 3 Brocade ADX HA Overview... 3 Hot-Standby HA... 4 Active-Standby

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

ERserver. iseries. TCP/IP routing and workload balancing

ERserver. iseries. TCP/IP routing and workload balancing ERserver iseries TCP/IP routing and workload balancing ERserver iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 1998, 2001. All rights reserved. US

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Default gateway redundancy (1) H1 DG: R1 H2 DG: R1 H3 DG: R1 R1 R2 ISP1 ISP2 Internet 3 Default gateway redundancy

More information

Configuring Port Security

Configuring Port Security CHAPTER 62 This chapter describes how to configure the port security feature. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master List, at this URL:

More information

Networking TCP/IP routing and workload balancing

Networking TCP/IP routing and workload balancing System i Networking TCP/IP routing and workload balancing Version 5 Release 4 System i Networking TCP/IP routing and workload balancing Version 5 Release 4 Note Before using this information and the product

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

Troubleshooting the Firewall Services Module

Troubleshooting the Firewall Services Module CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page

More information

Configuring IPS High Bandwidth Using EtherChannel Load Balancing

Configuring IPS High Bandwidth Using EtherChannel Load Balancing Configuring IPS High Bandwidth Using EtherChannel Load Balancing This guide helps you to understand and deploy the high bandwidth features available with IPS v5.1 when used in conjunction with the EtherChannel

More information

> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Switch and Ethernet Routing Switch Engineering

> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Switch and Ethernet Routing Switch Engineering Ethernet Switch and Ethernet Routing Switch Engineering > Technical Configuration Guide for Microsoft Network Load Balancing Enterprise Solutions Engineering Document Date: March 9, 2006 Document Version:

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Chapter 51 Server Load Balancing

Chapter 51 Server Load Balancing Chapter 51 Server Load Balancing Introduction... 51-3 Overview... 51-3 Server Load Balancer on the Router... 51-5 TCP Virtual Balancer... 51-6 Route-Based Virtual Balancer... 51-6 HTTP Virtual Balancer...

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

Chapter 37 Server Load Balancing

Chapter 37 Server Load Balancing Chapter 37 Server Load Balancing Introduction... 37-3 Overview... 37-3 Server Load Balancer on the Switch... 37-5 TCP Virtual Balancer... 37-6 Route-Based Virtual Balancer... 37-6 HTTP Virtual Balancer...

More information

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls

More information

Chapter 3 Configuring Basic IPv6 Connectivity

Chapter 3 Configuring Basic IPv6 Connectivity Chapter 3 Configuring Basic IPv6 Connectivity This chapter explains how to get a ProCurve Routing Switch that supports IPv6 up and running. To configure basic IPv6 connectivity, you must do the following:

More information

Firewall Defaults and Some Basic Rules

Firewall Defaults and Some Basic Rules Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

NetFlow v9 Export Format

NetFlow v9 Export Format NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new

More information

Configuring DHCP. DHCP Server Overview

Configuring DHCP. DHCP Server Overview Configuring DHCP This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP). For a complete description of the DHCP commands listed in this chapter, refer to the DHCP s chapter

More information

TCP/IP Networking Terms you ll need to understand: Techniques you ll need to master:

TCP/IP Networking Terms you ll need to understand: Techniques you ll need to master: 5 TCP/IP Networking Terms you ll need to understand: Subnet mask Subnetting Classless Interdomain Routing (CIDR) Transmission Control Protocol/Internet Protocol (TCP/IP) Address Resolution Protocol (ARP)

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Configuring the MNLB Forwarding Agent

Configuring the MNLB Forwarding Agent CHAPTER 3 Configuring the MNLB Forwarding Agent This chapter describes how to configure a Cisco router as an MNLB Forwarding Agent to operate in conjunction with a Cisco LocalDirector serving as Services

More information

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions

More information

How To Manage Outgoing Traffic On Fireware Xtm

How To Manage Outgoing Traffic On Fireware Xtm Fireware XTM Training Instructor Guide Fireware XTM Multi-WAN Methods Exploring Multi-WAN Through Hands-On Training This training is for: Devices WatchGuard XTM 2 Series /WatchGuard XTM 5 Series / WatchGuard

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Problem: the router is a single point of failure H1 H2 H3 VLAN4 H4 VLAN4 Corporate LAN Corporate LAN R1 R2

More information